Posts Tagged 'virtualization'

The Intel Security Advanced Threat Research Team has discovered a critical signature forgery vulnerability in the Mozilla Network Security Services (NSS) crypto library that could allow malicious parties to set up fraudulent sites masquerading as legitimate businesses and other organizations. The Mozilla NSS library, commonly utilized in the Firefox web browser, can also be found […]

The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]

Even if you do not experience the extreme cases, such as the 90% variation in traffic volume that Netflix experiences every day, or the one million new users per day growth rate of WhatsApp, virtualization is taking over your data center. Virtual instances of servers, storage, and networks all offer greater scalability, flexibility, and manageability, […]

Anyone with the responsibilities around server, infrastructure or computing knows to request, demand and expect 99.999% availability or refer to it as five 9s. So why isn’t there a default expectation to server security whether it’s sitting in a data closet, delivered as IaaS or in the near future instrumented as an element as part […]

This summer, the Federal Data Center Consolidation Initiative (FDCCI) ran into a problem with the Government Accountability Office. The FDCCI’s mission is to consolidate the number of governmental data centers to reduce infrastructure and operational costs, as well as to reduce the overall real estate and energy footprint caused by an excess of these facilities. […]

“On the Internet, nobody knows you’re a dog”.  More appropriately: “On the internet, nothing knows you’re a dog”. An emerging risk in the Internet of Things (IoT)  is associated with the quality of data related to “things”.  The risk is not that the data on or in the thing is corrupted itself. The risk  it […]